This book contains the best papers of the 4th International Conference on E-business and Telecommunications (ICETE), which was held during July 28–31, 2007 in Barcelona, Spain. The conference reflects a continuing effort to increase the dissemination of recent research results among professionals who work in the areas of e-business and telecommunications. ICETE is a joint international conf- ence integrating four major areas of knowledge that are divided into four cor- sponding conferences: ICE-B (International Conference on e-Business), SECRYPT (International Conference on Security and Cryptography), WINSYS (International Conference on Wireless Information Systems) and SIGMAP (International Conf- ence on Signal Processing and Multimedia). The program of this joint conference included several outstanding keynote lectures presented by internationally renowned distinguished researchers who are experts in the various ICETE areas. Their keynote speeches contributed to the ov- all quality of the program and heightened the significance of the theme of the conference. The conference topic areas define a broad spectrum in the key areas of- business and telecommunications. This wide view has made it appealing to a global audience of engineers, scientists, business practitioners and policy experts. The papers accepted and presented at the conference demonstrated a number of new and innovative solutions for e-business and telecommunication networks and systems, showing that the technical problems in these fields are challenging, related and significant.
表中的内容
Invited Speakers.- Pragmatic Computing – A Semiotic Perspective to Web Services.- Utility Computing: Reality and Beyond.- A Novel Grid-Based Micropayment System for Heterogeneous Multi-party Accounting.- I: ICE-B.- Bidding Agents That Perpetrate Auction Fraud.- A Platform for Mobile Service Provisioning Based on SOA-Integration.- A Hybrid Data Mining Approach for Credit Card Usage Behavior Analysis.- Critical Success Factors of Internet Shopping: The Case of Japan.- An Adaptive Knowledge-Based Approach for Detecting Fraud across Different e-Government Domains.- II: SECRYPT.- Timing to Block Scanning Malwares by Using Combinatorics Proliferation Model.- Securing Biometric Templates Where Similarity Is Measured with Set Intersection.- Score Equalization in SVM Multimodal Fusion for Person Recognition.- Remote Algorithmic Complexity Attacks against Randomized Hash Tables.- Securing Real-Time Sessions in an IMS-Based Architecture.- IPSec Database Query Acceleration.- Detection of Spoofed MAC Addresses in 802.11 Wireless Networks.- K2 Stream Cipher.- Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols.- Reliable Intersection Computation within Malicious Environments.- A Security Hardening Language Based on Aspect-Orientation.- III: SIGMAP.- Facial Expression Synthesis and Analysis.- Multi-sequence H.264/AVC Rate Control Based on the Linear Model.- Non Parametric Stochastic Expectation Maximization for Data Clustering.- Mapping Phonetic Features for Voice-Driven Sound Synthesis.- The Mi SPOT System: Personalized Publicity and Marketing over Interactive Digital TV.- Knowledge Engineering Aspects of Affective Bi-Modal Educational Applications.- IV: WINSYS.- Design of a Password-Based EAP Method.- Bit and Power Allocation Strategies for OFDM Systems over Time-Varying Channels.- Mobile Applications to a Pervasive World.- Multi-service Networks: A New Approach to End-to-End Topology Management.